On Jun 6, 2005, at 3:50 PM, Anthony Mayes via RT wrote:
Show quoted text>
> This is the last few sections before the error:
This seems very strange. I was expecting to see the error was
in the middle of a packet. But
Show quoted text> 30 84 00 00 01 FB 02 01 03 64 84 00 00 01 F2 04 0........d......
> 3C 43 4E 3D 6A 65 73 6B 65 72 2C 4F 55 3D 53 74 <CN=jesker,OU=St
This starts with 30, which is correct. The 01 FB is the packet length
and what I counted was right
Show quoted text> 30 84 00 00 02 05 02 01 03 64 84 00 00 01 FC 04 0........d......
> 3D 43 4E 3D 6A 65 73 6C 6F 77 65 2C 4F 55 3D 53 =CN=jeslowe,OU=S
Again, starts with 30 and the length was 0205
Show quoted text> 00 84 00 00 01 FB 02 01 03 64 84 00 00 01 F2 04 .........d......
> 3C 43 4E 3D 6A 65 73 6D 6F 6E 2C 4F 55 3D 53 74 <CN=jesmon,OU=St
Now this is where it gets weird. We have 00 instead of 30 but the rest
looks OK. Even the length of 01 FB is ok.
I was expecting to find I had read the packet boundaries wrong,
but it looks like there is bad data in the stream.
So this is looking more like a server bug. But before we declare that
we need to insure that my read code did not do something weird.
I see you are using LDAPS, is it possible to reproduce this by just
using LDAP. Then use tcpdump or something to watch the network interface
I just want to be sure it is not a bug in my code before telling you
to talk to the server vendor.
Other things to look at/try
Are you running the latest IO::Socket::SSL Net::SSLeay code ?
Can you run the ldapsearch command line utility with the same search ?
Graham.